@Diana C ,
Based on our discussions and feedback from the Container Apps team, summarizing the possible ways
- Using Private Endpoints with Azure Front Door (Recommended Approach)
- Enabling Private Endpoints for your Container Apps eliminates all external access.
- When combined with Azure Front Door (AFD), only requests from your registered inbound domain (via AFD) will be allowed.
- This approach ensures a secure, controlled entry point while keeping your resources private.
To enable communication between your App Services and Container App, you can:
- Place both services in the same VNet and configure networking to route traffic through the same private endpoint.
- Alternatively, set up separate private endpoints for different applications based on your access control needs.
- This will effectively restrict access to only the required resources within the VNet while preventing unwanted external traffic.
But as you have mentioned Container Apps must be placed in a VNet at the time of creation, and currently, Azure does not support moving an existing Container App into a VNet after deployment.
- Alternative Approach: Whitelisting Microsoft Regional Service IPs
If transitioning to Private Endpoints is not feasible, another option is to whitelist Microsoft’s regional service IP ranges in the IP restriction settings. However, there are some considerations:
- Microsoft updates these IP ranges weekly, requiring frequent allowlist updates.
- The latest IP ranges can be obtained from Azure Datacenter IP Ranges.